Exploits Wiki exploitswiki https://exploits.miraheze.org/wiki/Main_Page MediaWiki 1.40.1 first-letter Media Special Talk User User talk Exploits Wiki Exploits Wiki talk File File talk MediaWiki MediaWiki talk Template Template talk Help Help talk Category Category talk Module Module talk Main Page 0 1 1 2023-10-31T15:44:40Z MediaWiki default 1 Create main page wikitext text/x-wiki __NOTOC__ == Welcome to {{SITENAME}}! == This Main Page was created automatically and it seems it hasn't been replaced yet. === For the bureaucrat(s) of this wiki === Hello, and welcome to your new wiki! Thank you for choosing Miraheze for the hosting of your wiki, we hope you will enjoy our hosting. You can immediately start working on your wiki or whenever you want. Need help? No problem! We will help you with your wiki as needed. To start, try checking out these helpful links: * [[mw:Special:MyLanguage/Help:Contents|MediaWiki guide]] (e.g. navigation, editing, deleting pages, blocking users) * [[meta:Special:MyLanguage/FAQ|Miraheze FAQ]] * [[meta:Special:MyLanguage/Request features|Request settings changes on your wiki]]. (Extensions, Skin and Logo/Favicon changes should be done through [[Special:ManageWiki]] on your wiki, see [[meta:Special:MyLanguage/ManageWiki|ManageWiki]] for more information.) ==== I still don't understand X! ==== Well, that's no problem. Even if something isn't explained in the documentation/FAQ, we are still happy to help you. You can find us here: * [[meta:Special:MyLanguage/Help center|On our own Miraheze wiki]] * On [[phab:|Phabricator]] * On [https://miraheze.org/discord Discord] * On IRC in #miraheze on irc.libera.chat ([irc://irc.libera.chat/%23miraheze direct link]; [https://web.libera.chat/?channel=#miraheze webchat]) === For visitors of this wiki === Hello, the default Main Page of this wiki (this page) has not yet been replaced by the bureaucrat(s) of this wiki. The bureaucrat(s) might still be working on a Main Page, so please check again later! 21236ac3f8d65e5563b6da6b70815ca6bf1e6616 2 1 2023-10-31T20:34:35Z AverseABFun 2 wikitext text/x-wiki __NOTOC__ == Welcome to the Exploits Wiki! == Pretty much nothing is finished, but you can check out the [[Exploits List|full list of exploits]], or [[Exploits Timeline|the timeline]]. db55c11c90ce74b81df281033d2a1e1c917d9f30 6 2 2023-11-01T14:05:04Z AverseABFun 2 wikitext text/x-wiki __NOTOC__ == Welcome to the Exploits Wiki! == Pretty much nothing is finished, but you can check out the [[Exploits List|full list of exploits]]. 165acdf9b192b30ecb35147c8986809257ddb4ec Exploits List 0 3 5 2023-11-01T14:04:28Z AverseABFun 2 Created page with "Here is the list, with no particular ordering. * LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web" wikitext text/x-wiki Here is the list, with no particular ordering. * LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web b33d2037c8a0fd53f27d5b19044f9e2e09defbd9 7 5 2023-11-01T16:01:34Z Wingetov 4 wikitext text/x-wiki This is a list of exploits found that can be used to bypass administrative restrictions. ==Formal Exploits== These are [insert description here] * LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web ==Informal Explots== These are [insert description here] 17d1aa031310d54aca85efcf81716d2a91e58f2c 8 7 2023-11-01T16:03:13Z AverseABFun 2 /* Formal Exploits */ wikitext text/x-wiki This is a list of exploits found that can be used to bypass administrative restrictions. ==Formal Exploits== These are true exploits that aren't just using a different mode or something. * LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web ==Informal Explots== These are [insert description here] 25b5a132d6ca8378ac4fe4eb3330f286408e5f40 9 8 2023-11-01T16:06:00Z AverseABFun 2 /* Informal Explots */ wikitext text/x-wiki This is a list of exploits found that can be used to bypass administrative restrictions. ==Formal Exploits== These are true exploits that aren't just using a different mode or something. * LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web ==Informal Exploits== These are exploits that aren't really exploits, for example using the sign language version of Xtramath to disable the timer * ASL Xtramath - (no link) af8edd8094a164369db1c285dae06ffef926d674 10 9 2023-11-01T16:12:57Z Wingetov 4 wikitext text/x-wiki This is a list of exploits found that can be used to bypass administrative restrictions. ==Formal Exploits== These are true exploits that involve using bypasses/backdoors. * LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web ==Informal Exploits== These are everything else, for example, abusing design. * ASL Xtramath: Using the American Sign Language on XtraMath disables the timer. 6da048c044eedc7d7a4cd5b349bf70c4b40ce357 11 10 2023-11-01T18:51:39Z AverseABFun 2 /* Formal Exploits */ wikitext text/x-wiki This is a list of exploits found that can be used to bypass administrative restrictions. ==Formal Exploits== These are true exploits that involve using bypasses/backdoors. * LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web * Dextensify: https://dextensify.pages.dev/main * CAUB: https://caub.glitch.me/ * Sync Internals Password Extractor(SIPE): https://sipe.glitch.me/ ==Informal Exploits== These are everything else, for example, abusing design. * ASL Xtramath: Using the American Sign Language on XtraMath disables the timer. 850a5626c58ec4725e08455f9fb984612f178413 12 11 2023-11-02T13:46:57Z AverseABFun 2 /* Informal Exploits */ wikitext text/x-wiki This is a list of exploits found that can be used to bypass administrative restrictions. ==Formal Exploits== These are true exploits that involve using bypasses/backdoors. * LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web * Dextensify: https://dextensify.pages.dev/main * CAUB: https://caub.glitch.me/ * Sync Internals Password Extractor(SIPE): https://sipe.glitch.me/ ==Informal Exploits== These are everything else, for example, abusing design. * ASL Xtramath: Using the American Sign Language on XtraMath disables the timer. * Plotly: Getting the Plotly app from the Chrome Web Store allows you to go to Google eventually if you follow some long set of steps. 19f04a77b49b1f60768cfb7c5d2ff36595b10197 13 12 2023-11-15T13:43:43Z 107.191.79.90 0 wikitext text/x-wiki This is a list of exploits found that can be used to bypass administrative restrictions. ==Formal Exploits== These are true exploits that involve using bypasses/backdoors. * LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web * Dextensify: https://dextensify.pages.dev/main * CAUB: https://caub.glitch.me/ * Sync Internals Password Extractor(SIPE): https://sipe.glitch.me/ ==Informal Exploits== These are everything else, for example, abusing design. * ASL Xtramath: Using the American Sign Language on XtraMath disables the timer. * Portkey: Several apps downloaded through the Chrome Web Store or the Play Store can be used to access the web by opening a series of links ''in the app itself, rather than by opening a new window''. Requires some experimentation, and won't work on all apps. 0f01779d345b337715350740deecac42ec808539